Montgomery College 2018-2019 Catalog 
    
    Mar 29, 2024  
Montgomery College 2018-2019 Catalog [ARCHIVED CATALOG]

Add to Favorites (opens a new window)

NWIT 290 - Information Security Capstone


Provides a review of methods for identifying network vulnerabilities, implementing net- work defense, and exploring network forensics. Students have opportunities to implement a layered defense on a practical network, including using tools to analyze the vulnerabilities of a net- work. Additionally, students will research products that could serve as countermeasures against potential attacks, implement security features of the network’s operating systems, and develop alternate solutions based upon cost and level of security required. The course also provides students with the practice skills necessary to enhance their existing network security background and prepare for Professional Security Certification(s). PREREQUISITE(S): NWIT 246  or consent of department. Three hours each week. Formerly NW 270.

3 semester hours

Course Outcomes:
Upon course completion, a student will be able to:

  • Demonstrate critical thinking and problem-solving skills on issues related to cybersecurity.
  • Explain current policies and practices related to threats against network infrastructures.
  • Describe legal, social, and ethical concerns related to securing information systems and networks.
  • Explain the differences between internal and external threats and how to defend against each.
  • Discuss the important principles and theories that are used within the cybersecurity field.
  • Propose solutions for real-world cybersecurity problems.
  • List the different environmental and physical controls that can be used to protect an IT environment.
  • Interpret business continuity plans and risk assessment techniques and describe the strategies
  • used when creating a risk management process.
  • Explain security training for end-users and the methodologies and tools used for security education, training, and awareness (SETA).
  • Describe security ramifications, technology weaknesses, configuration weaknesses, policy weaknesses and human errors.


View Schedule of Classes




Add to Favorites (opens a new window)